Thinging Machine applied to Information Leakage

11/30/2018
by   Sabah S. Al-Fedaghi, et al.
0

This paper introduces a case study that involves data leakage in a bank applying the so-called Thinging Machine (TM) model. The aim is twofold: (1) Presenting a systematic conceptual framework for the leakage problem that provides a foundation for the description and design of a data leakage system. (2) The aim in (1) is developed in the context of experimentation with the TM as a new methodology in modeling. The TM model is based on slicing the domain of interest (a part of the world) to reveal data leakage. The bank case study concentrates on leakage during internal operations of the bank. The leakage spots are exposed through surveying data territory throughout the bank. All streams of information flow are identified, thus points of possible leakage can be traced with appropriate evidence. The modeling of flow may uncover possible hidden points of leakage and provide a base for a comprehensive information flow policy. We conclude that a TM based on the Heideggerian notion of thinging can serve as a foundation for early stages of software development and as an alternative approach to the dominant object-orientation paradigm.

READ FULL TEXT

page 3

page 4

page 5

page 7

page 8

page 9

page 10

research
09/10/2018

Is Leakage Power a Linear Function of Temperature?

In this work, we present a study of the leakage power modeling technique...
research
12/22/2020

Information Leakage Games: Exploring Information as a Utility Function

A common goal in the areas of secure information flow and privacy is to ...
research
11/29/2022

Abstract Interpretation-Based Data Leakage Static Analysis

Data leakage is a well-known problem in machine learning. Data leakage o...
research
05/11/2019

On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem

Quantitative information flow (QIF) is traditionally defined as the expe...
research
09/25/2019

On the Information Leakage in Private Information Retrieval Systems

We consider information leakage to the user in private information retri...
research
03/30/2019

PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos

This paper studies leakage of user passwords and PINs based on observati...
research
03/30/2020

Modeling Network Security: Case Study of Email System

We study operational security in computer network security, including in...

Please sign up or login with your details

Forgot password? Click here to reset